<?xml version='1.0' encoding='utf-8' ?>
<iCalendar xmlns:pentabarf='http://pentabarf.org' xmlns:xCal='urn:ietf:params:xml:ns:xcal'>
    <vcalendar>
        <version>2.0</version>
        <prodid>-//Pentabarf//Schedule//EN</prodid>
        <x-wr-caldesc></x-wr-caldesc>
        <x-wr-calname></x-wr-calname>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>SVTD8P@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-SVTD8P</pentabarf:event-slug>
            <pentabarf:title>Orange is the new Black</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T091500</dtstart>
            <dtend>20240905T092000</dtend>
            <duration>000500</duration>
            <summary>Orange is the new Black</summary>
            <description>Oranges: The Juicy Heartbeat of Innovation and Well-being

Prepare to embark on a vibrant journey into the world of one of nature&#x27;s most extraordinary gifts—Oranges! As we gather here today, let us peel back the layers of this citrus marvel to reveal the rich tapestry of innovation, health, and cultural significance that it brings to our lives. This kick-off will be an exhilarating exploration of the orange&#x27;s journey from grove to greatness, celebrating its role as a catalyst for health, culinary creativity, and economic vitality.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/SVTD8P/</url>
            <location>Main track</location>
            
            <attendee>Fish_, Cherry and Stef</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>XVEWPL@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-XVEWPL</pentabarf:event-slug>
            <pentabarf:title>Cybersecurity’s New Imperative: Metawar - Defending the Cognitive Infrastructure.</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T092000</dtstart>
            <dtend>20240905T100000</dtend>
            <duration>004000</duration>
            <summary>Cybersecurity’s New Imperative: Metawar - Defending the Cognitive Infrastructure.</summary>
            <description>A long time ago, on June 27, 1991, Winn testified before the US Congress and was asked, “Mr. Schwartau: Why would the bad guys ever want to use the internet?” 

Today, our cognitive infrastructure is under attack, and humanity needs hackers more than ever. 

Metawar is the art and science of creating immersive experiences to influence, alter, and define one’s sense of reality. It is the battle for control over one’s belief systems, identity, and sense of reality outside one’s conscious awareness. Reason and emotion are incompatible operating systems. 

Big Tech is digitally terraforming the planet’s future cognitive infrastructure, Web 3.0, with little concern for the downsides. The metaverse is an evolving, immersive storytelling environment designed to be the most powerful and addictive reality distortion machine ever conceived. It will also predict and anticipate your every desire and every move! 

On the global stage, metawar represents the sixth domain of warfare.⁠1 They who control the technology control the narrative, and reality is only a keystroke away. 

We have no choice but to learn how to coexist with the reality-distorting technologies we have created by implementing technical, policy, and cognitive defenses to protect our sense of truth, reality, and self-identity. 

Winn’s keynote is a call to action. 

The hacker community is among the best problem solvers the planet has ever seen. It acts as a team, a collective of like-minded individuals with an amazing array of skills who stop at nothing to achieve their aims—against all odds.

Winn challenges us with a new goal: Strengthen and defend the human mental immune system. Our brains, sensory nervous systems, and minds are the new attack surface.

Will the hacker community rise to the challenge of solving the most existential threat it has ever faced?</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/XVEWPL/</url>
            <location>Main track</location>
            
            <attendee>Winn Schwartau</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FSCA3A@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FSCA3A</pentabarf:event-slug>
            <pentabarf:title>Low Energy to High Energy: Hacking Nearby EV-Chargers Over Bluetooth</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T100000</dtstart>
            <dtend>20240905T103000</dtend>
            <duration>003000</duration>
            <summary>Low Energy to High Energy: Hacking Nearby EV-Chargers Over Bluetooth</summary>
            <description>As electric vehicles become increasingly integrated into our transportation infrastructure, the security of their charging systems is becoming paramount. A threat actor hacking EV chargers at scale could have a real life impact on the continuity of our power grid and the transportation sector. Therefore, it is important that manufacturers and operators are well aware of their role in protecting our power grid.

This year we demonstrated several zero day attacks against commonly used EV chargers during the international Pwn2Own Automotive competition. Most of these vulnerabilities were very easy to find once the firmware was extracted. The lack of mitigations against binary exploitation meant writing the exploits was also straightforward.

In this talk, we will explain the vulnerabilities we found, the exploits we developed and what lessons about IoT security in general can be learned from this.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/FSCA3A/</url>
            <location>Main track</location>
            
            <attendee>Daan Keuper</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>EFL9RJ@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-EFL9RJ</pentabarf:event-slug>
            <pentabarf:title>Making penetration testing auditable</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T110000</dtstart>
            <dtend>20240905T113000</dtend>
            <duration>003000</duration>
            <summary>Making penetration testing auditable</summary>
            <description>### Unveiling a Revolutionary Approach to Penetration Testing: The Methodology for Information Security Research with Audit Value

In the ever-evolving landscape of cybersecurity, penetration testing has become a cornerstone for ensuring product security and compliance. However, the methods of conducting these tests can vary significantly, sometimes offering clear insights and other times leaving much to be desired. Clients rely on these tests not only for assurance but also for their crucial audit value. The recent COVID-19 crisis highlighted a vital need: enhancing client assurance through more transparent and reliable penetration tests, a necessity increasingly driven by stringent legislation.

#### A Unique Collaboration for Enhanced Security

This realization led to the formation of a groundbreaking collaboration, bringing together clients, software developers, pentesters, auditors, and information security researchers. Our innovative approach is designed to empower every knowledgeable professional to contribute, ensuring that every critical component is thoroughly examined. Welcome to the Methodology for Information Security Research with Audit Value.

#### Focusing on Open Standards

Our methodology is rooted in open standards, promoting transparency, interoperability, and innovation. By adhering to these standards, we ensure that our approach is not only robust but also adaptable to various environments and requirements. Open standards facilitate a common language and framework, making it easier for all stakeholders to collaborate and for solutions to integrate seamlessly.

#### Addressing Requirements and Consequences

The Methodology for Information Security Research with Audit Value goes beyond merely meeting requirements. It provides a clear understanding of the consequences if certain aspects are missing, ensuring that clients are fully informed of potential risks and impacts. This comprehensive approach includes:

- **Procurement Requirements**: Ensuring that all inkoopeisen (procurement requirements) are met with precision, helping clients make informed decisions when acquiring new products or services.
- **Legal Aspects**: Addressing all juridische aspecten (legal aspects) to ensure compliance with relevant laws and regulations, thereby minimizing legal risks and liabilities.

#### Providing Comprehensive Compliance Tools

Our methodology equips you with everything needed to achieve and maintain compliance. From detailed guidelines and best practices to thorough checklists and audit trails, we provide all the tools necessary to ensure that nothing is overlooked. This includes:

- **Detailed Guidelines**: Step-by-step instructions and best practices to guide you through every stage of the penetration testing process.
- **Thorough Checklists**: Comprehensive checklists to ensure all critical aspects are covered, leaving no room for oversight.
- **Audit Trails**: Robust audit trails that document every action and decision, providing transparency and accountability throughout the testing process.

#### Transforming Security and Compliance

Embrace this innovative methodology and transform the way you achieve security and compliance. The Methodology for Information Security Research with Audit Value represents a comprehensive, participatory approach that elevates the standards of penetration testing. By focusing on open standards, addressing requirements and their consequences, and providing all necessary compliance tools, we ensure that your security measures are not only effective but also thoroughly documented and auditable.

Join us in pioneering a new era of cybersecurity. Discover the future of penetration testing with the Methodology for Information Security Research with Audit Value, and ensure that your security practices are second to none.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/EFL9RJ/</url>
            <location>Main track</location>
            
            <attendee>Brenno de Winter</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>C8PRBG@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-C8PRBG</pentabarf:event-slug>
            <pentabarf:title>The Registry Rundown</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T113000</dtstart>
            <dtend>20240905T120000</dtend>
            <duration>003000</duration>
            <summary>The Registry Rundown</summary>
            <description>The talk will cover the basics of the Windows Registry and its structure, including the different hives (e.g. HKLM, HKCU) and their purpose. We will then delve into the different ways the registry can be accessed, both locally and remotely.

Lots of informaton can be gathered from a remote system via the Remote Registry, such as installed software, configuration, and user activity. All using the privileges of a regular domain user without local administrator permission.

We will share some interesting findings that we came across that facilitate lateral movement via the registry (bypassing remote UAC). We also successfully used the Remote Registry service to bypass typical jumpbox restrictions that normally don’t allow the user to login via RDP directly.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/C8PRBG/</url>
            <location>Main track</location>
            
            <attendee>Cedric Van Bockhaven</attendee>
            
            <attendee>Max Grim</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>DSMSJH@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-DSMSJH</pentabarf:event-slug>
            <pentabarf:title>Securing OT, too hard or not for me?</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T120000</dtstart>
            <dtend>20240905T123000</dtend>
            <duration>003000</duration>
            <summary>Securing OT, too hard or not for me?</summary>
            <description>Presentation outline:
- Introduction
- Why is OT different from IT?
- OT threats
	- Targeted (critical infrastructure) vs non targeted (generic OT)
	- Example threat scenarios:
		- Ransomware
		- (Preposition for) sabotage
		- Supply chain and suppliers
		- Internet connected OT devices and hacktivists
* Security testing OT
	* Why is this different?
	* Approach
* Common vulnerabilities and weaknesses
	* Network design &amp; security architecture
		* Purdue model
		* firewall configuration
		* Virtualisation
		* Switching infrastructure
	* Windows systems
		* Active Directory
		* Vulnerabilities
		* Hardening
	* HMI, PLC, sensors and actuators
		* Weak or default passwords
		* Vulnerabilities
		* Insecure protocols
* Conclusions &amp; recommendations
* Questions</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/DSMSJH/</url>
            <location>Main track</location>
            
            <attendee>Erwin Paternotte</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>ZEXPCK@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-ZEXPCK</pentabarf:event-slug>
            <pentabarf:title>Protecting organizations against AITM: lessons learned.</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T133000</dtstart>
            <dtend>20240905T140000</dtend>
            <duration>003000</duration>
            <summary>Protecting organizations against AITM: lessons learned.</summary>
            <description>There’s been an uprising in the amount of AITM based attacks. BEC fraud operators use it as MFA is more and more common. But the apearance of SaaS providers in the AITM space make these attacks easier to perform and therefore making them more common. Booking.com has been a popular target allowing attackers to use the hotel operator login to phish creditcards by sending upcomming guests reminders to pay. The fact that these reminders are sent via the booking.com app makes them super trustworthy. At the same time environments such as M365/EntraID are popular targets for other operators. This past year we’ve been trying to prevent and detect these types of attacks. The goal of the presentation is make attendees aware of the risks, the different operators and types of attacks happening today.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/ZEXPCK/</url>
            <location>Main track</location>
            
            <attendee>Rik van Duijn</attendee>
            
            <attendee>Wesley</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>CTQP8R@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-CTQP8R</pentabarf:event-slug>
            <pentabarf:title>Offensive Development in Modern Languages</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T140000</dtstart>
            <dtend>20240905T143000</dtend>
            <duration>003000</duration>
            <summary>Offensive Development in Modern Languages</summary>
            <description>As a security professional, building tools to support your operations is no longer optional. Offensive specialists need to build advanced and custom malware to effectively stay under the radar and simulate threats, and effectively automate full attack workflows to cover large scopes and ensure repeatable results.

In this talk, Cas will explore the concept of &quot;Offensive Development&quot;, how it differs from malware development, and how choosing the right language from modern programming languages such as Rust, Golang, Python and Nim can significantly impact your tools (and your sanity). 

Cas will provide insights into the strengths and weaknesses of each language, supported by case studies that highlight their practical, real-world applications in offensive security. These case studies will also highlight the importance of good developer practice to ensure your next repository doesn&#x27;t have to contain a disclaimer that says &quot;POC CODE - DON&#x27;T RUN IN PRODUCTION&quot; ;)

This talk is designed for both seasoned offensive security professionals and beginners with a foundational technical understanding. It will provide valuable insights not only for red teamers but for the broader security industry, emphasizing the importance of automation and a development mindset in today&#x27;s complex security landscape.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/CTQP8R/</url>
            <location>Main track</location>
            
            <attendee>Cas van Cooten</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>GMGBGE@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-GMGBGE</pentabarf:event-slug>
            <pentabarf:title>Attacking Primary Refresh Tokens using their MacOS implementation</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T143000</dtstart>
            <dtend>20240905T151500</dtend>
            <duration>004500</duration>
            <summary>Attacking Primary Refresh Tokens using their MacOS implementation</summary>
            <description>While Microsoft Entra Primary Refresh Tokens remain mostly undocumented, on Windows there has been quite some research in how they work and how they can be attacked or protected. Despite several hiccups (read: vulnerabilities) in getting there, the implementation is now mostly secure if you have a Trusted Platform Module (TPM). On other platforms, the Primary Refresh Token is also used but its implementation is undocumented. We decided to investigate how Microsoft implemented Primary Refresh Tokens on MacOS, how they are protected and how hard (or easy) it is for attackers to steal them. During the investigation, we encountered more undocumented protocol features, leading to the discovery of deviceless Primary Refresh Tokens (PRTs). These deviceless PRTs, which as the name implies are only tied to a user and not a device. In some environments this might already be enough for an attacker to achieve their goal, since these PRTs could be obtained during phishing. 

In this session, we will talk about the PRT internals, their protection on MacOS, and on the current and new PRT implementation Microsoft introduced using the Platform SSO capabilities.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/GMGBGE/</url>
            <location>Main track</location>
            
            <attendee>Olaf Hartong</attendee>
            
            <attendee>Dirk-jan Mollema</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>YZRPBK@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-YZRPBK</pentabarf:event-slug>
            <pentabarf:title>Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T154500</dtstart>
            <dtend>20240905T162500</dtend>
            <duration>004000</duration>
            <summary>Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!</summary>
            <description>## 1. Methodology and Our New Attack Surface

We focus on exploring the interactions between Apache Httpd modules, as mentioned in the abstract. Apache Httpd is a world constructed of modules, even the official documentation highlights that:

*URL: https://httpd.apache.org/docs/2.4/mpm.html*

&gt; Apache HTTP Server 2.0 extends this modular design to the most basic functions of a web server.

Httpd modules are free to register hooks to the phases they&#x27;re interested in. An HTTP request will **walk through** all modules, and at each stage, it&#x27;s up to the modules to decide whether to ACCEPT or REJECT the current request. An issue arises from the fact that:

&gt; Modules do not fully understand each other&#x27;s implementation details. However, they are asked to collaborate to complete the entire HTTP process.

For an HTTP request, all modules share and maintain an internal data structure `request_rec` with nearly a hundred members. If there is an ambiguity in understanding the same structure member among modules, it can easily lead to problems. Similarly, if a module mistakenly modifies a member that is insignificant to it but crucial to another module in this shared structure, it might affect other modules&#x27; decisions and cause problems, too!


## 2. Proposed THREE Attacks and EIGHT New Vulnerabilities

Based on the concept mentioned above, we have created 3 distinct types of Confusion Attacks on Apache HTTP Server:

1. **Filename Confusion Attack**: For a same HTTP request, some modules treat `r-&gt;filename` as a URI, while others treat it as a filesystem path. This inconsistency causes security issues such as source code disclosure or ACL/Authentication Bypass.
2. **DocumentRoot Confusion Attack**: For any RewriteRule Mapping, Httpd would try to access both the relative path and absolute path. This leads to unintended files accessing outside the DocumentRoot.
3. **Handler Confusion Attack**: For the same `request_rec` structure, under certain conditions, `r-&gt;content_type`, `r-&gt;handler`, and `r-&gt;filename` are interconnected and can be transformed into each other, leading to security issues such as SSRF or RCE.

These Confusion Attacks can be transformed into different types of vulnerability classes. So far, we have uncovered 8 vulnerabilities in Apache HTTP Server, including:

1. **CVE-2024-38477 - important**: Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious request
2. **CVE-2024-38476 - important**: Apache HTTP Server may use exploitable/malicious backend application output to run local handlers via internal redirect
3. **CVE-2024-38475 - important**: Apache HTTP Server weakness in mod_rewrite when first segment of substitution matches filesystem path
4. **CVE-2024-38474 - important**: Apache HTTP Server weakness with encoded question marks in backreferences
5. **CVE-2024-38473 - moderate**: Apache HTTP Server proxy encoding problem
6. **CVE-2024-38472 - important**: Apache HTTP Server on Windows UNC SSRF
7. **CVE-2024-39573 - moderate**: Apache HTTP Server: mod_rewrite proxy handler substitution
8. **CVE-2023-38709 - moderate**: Apache HTTP Server: HTTP response splitting

You can check the [Apache HTTP Server website](https://httpd.apache.org/security/vulnerabilities_24.html) for details!

Our presentation will focus mainly on vulnerabilities #2, #3, #4, #5 and #7. The impacts include, but are not limited to:

- Sensitive Information Leakage
- Denial-of-Service Attack
- ACL and Authentication Bypass
- Arbitrary Server-Side Source Code Disclosure
- Arbitrary File Read
- SSRF (Server-Side Request Forgery)
- RCE (Remote Code Execution)


## 3. Demo

We will demonstrate how a long-underestimated bug type can be transformed into powerful exploits, including Info-Leak, SSRF, and RCE by leveraging Httpd&#x27;s internal features.

This breakthrough is powered by our innovative Confusion Attack technique, enhancing our capability to intricately navigate and manipulate Httpd modules.


## 4. Previous Work

As far as I know, attacks that specifically target the inconsistencies within Httpd&#x27;s internal structure have been rare. The only closest discussion on this topic was presented by Max Dmitriev at ZeroNights 2021:

*Title: Apache 0day bug, which still nobody knows of, and which was fixed accidentally*
*Slide: https://tinyurl.com/bdxdfk8j*

However, the discussion did not extensively explore this avenue. The publicly available bug description suggests that the real issue was not precisely identified.

&gt; &quot;...a lack of control over an Apache error when using php-cgi and ModSecurity...&quot;

In reality, any handler based on `Content-Type` should be vulnerable, indicating that not only php-cgi but also the widely utilized mod_php could be at risk.


## 5. Notes

The issues we have identified are present in the core modules of Apache Httpd, not in third-party modules that are rarely or never installed. :)</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/YZRPBK/</url>
            <location>Main track</location>
            
            <attendee>Orange Tsai</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>DKGN93@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-DKGN93</pentabarf:event-slug>
            <pentabarf:title>Closing Keynote: U-matter</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T162500</dtstart>
            <dtend>20240905T165500</dtend>
            <duration>003000</duration>
            <summary>Closing Keynote: U-matter</summary>
            <description>To be announced/It&#x27;s gonna be a surprise.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/DKGN93/</url>
            <location>Main track</location>
            
            <attendee>Inge Bryan</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>8QBSMA@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-8QBSMA</pentabarf:event-slug>
            <pentabarf:title>Securing devices or profits? Examining the device security of a network appliance vendor</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T110000</dtstart>
            <dtend>20240905T113000</dtend>
            <duration>003000</duration>
            <summary>Securing devices or profits? Examining the device security of a network appliance vendor</summary>
            <description>This talk will focus on Cisco Meraki&#x27;s efforts to secure their recent devices against unsigned code execution, the specific steps they&#x27;ve taken, and details on the mistakes made that allow users to run an open-source firmware like OpenWrt on their device. You can expect photos of hardware disassembly, C code, and disassembler screenshots.

I will also go over what steps you can take if you plan to ship an embedded device and want to prevent tampering. Finally, I will discuss over the moral and ethical issues surrounding secure boot, device re-use, and e-waste.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/8QBSMA/</url>
            <location>Second track</location>
            
            <attendee>Hal Martin</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>XFDFLL@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-XFDFLL</pentabarf:event-slug>
            <pentabarf:title>Elevate Your Skills: From COM object fundamentals to UAC bypasses</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T113000</dtstart>
            <dtend>20240905T120000</dtend>
            <duration>003000</duration>
            <summary>Elevate Your Skills: From COM object fundamentals to UAC bypasses</summary>
            <description>n/a</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/XFDFLL/</url>
            <location>Second track</location>
            
            <attendee>Tijme Gommers</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>LN3EPV@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-LN3EPV</pentabarf:event-slug>
            <pentabarf:title>Exploiting the Core: A Deep Dive into Kernel Driver Vulnerability Hunting</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T120000</dtstart>
            <dtend>20240905T123000</dtend>
            <duration>003000</duration>
            <summary>Exploiting the Core: A Deep Dive into Kernel Driver Vulnerability Hunting</summary>
            <description>In this talk, we will explore the crucial aspects of finding and exploiting vulnerabilities in kernel drivers, a key area in cybersecurity research. Kernel drivers are core system components, and vulnerabilities in these components can have a large impact on systems. The talk will begin by highlighting the importance of kernel driver vulnerabilities and the impact they can have, demonstrated through real-world examples of malware and threat actor activities.

We will share insights from our own research, revealing the prevalence of vulnerabilities in various drivers and the types of vulnerabilities we&#x27;ve encountered. Attendees will learn about all aspects needed to kick-start vulnerability research in this area. This includes building a driver database, understanding different driver types, knowing which ones are most likely to contain exploitable vulnerabilities and recognizing common vulnerability classes.

The talk will also cover practical aspects of interacting with drivers, including methods for loading them and understanding the communication interfaces between user and kernel space. This knowledge is critical for understanding the attack surface of drivers. Additionally, we will discuss setting up a research environment and several automated tools to streamline the process of vulnerability discovery.

Overall, this talk aims to equip participants with the skills and knowledge needed to start their journey in finding kernel driver vulnerabilities, enhancing their ability to contribute to cybersecurity defenses. Whether you&#x27;re a beginner or looking to refine your techniques, this session will provide valuable insights into this complex and impactful area of research.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/LN3EPV/</url>
            <location>Second track</location>
            
            <attendee>Jan-Jaap Korpershoek</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>8ZA3CU@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-8ZA3CU</pentabarf:event-slug>
            <pentabarf:title>An angel, python, root and config walked into a bar...</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T133000</dtstart>
            <dtend>20240905T140000</dtend>
            <duration>003000</duration>
            <summary>An angel, python, root and config walked into a bar...</summary>
            <description>The talk will begin with a short story on how the entire process started before proceeding into details on the NsaRescueAngel backdoor (CVE-2024-29972). Once there is a basic understanding of the core requirements set to exploit it we will move along into the authentication mechanisms present. It&#x27;s flaws, consequences and results (CVE-2024-29974, CVE-2024-29972, CVE-2024-29976). Further on the talk will investigate a python code injection caused by the architectural design of a CherryPy webserver present on the machine (CVE-2024-29973), how the framework design caused the developers to first fix one zeroday found by IBM (CVE-2023-27992) and in a future update reimplement it once more. Finally previous patches performed on the code injection will receive a brief investigation and conclusions for the set questions will be drawn.

# Key questions the talk intends to address
* What were the actual vulnerabilities I found?
* Insight into patterns and trends observed in past CVEs 
* Can we expect to see more of them?</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/8ZA3CU/</url>
            <location>Second track</location>
            
            <attendee>Timothy Hjort</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>YWRH7X@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-YWRH7X</pentabarf:event-slug>
            <pentabarf:title>All cops are broadcasting: Breaking TETRA after decades in the shadows</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T140000</dtstart>
            <dtend>20240905T143000</dtend>
            <duration>003000</duration>
            <summary>All cops are broadcasting: Breaking TETRA after decades in the shadows</summary>
            <description>This talk is an overview of the most important of the five uncovered issues, collectively dubbed TETRA:BURST. 

First, we uncover the presence of a deliberate backdoor in the TEA1 cipher, which is used in critical infrastructure. This backdoor reduces the effective key strength from 80 to 32 bits, rendering it vulnerable to an exhaustive search attack. The demonstrated attack is fully passive, and runs in under a minute. 
Second, we present a keystream recovery attack which works regardless of the cipher employed, affecting all encrypted TETRA networks. 
Furthermore, we discuss a de-anonymization attack with counter-intelligence implications and a flaw in the authentication protocol. 

Additionally, we provide the attendee with background information on TETRA&#x27;s role in critical infrastructure as a SCADA telecontrol link, and how the TEA1 backdoor proliferated throughout Europe, exposing our critical infrastructure as well as several European military and police users to very severe risks.

See [https://midnightblue.nl/tetraburst](https://midnightblue.nl/tetraburst) for more details.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/YWRH7X/</url>
            <location>Second track</location>
            
            <attendee>Wouter Bokslag</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>VBC9AB@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-VBC9AB</pentabarf:event-slug>
            <pentabarf:title>How to crack seven billion passwords?</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T143000</dtstart>
            <dtend>20240905T150000</dtend>
            <duration>003000</duration>
            <summary>How to crack seven billion passwords?</summary>
            <description>In this presentation we dive into the process of cracking billions of passwords, and how this data can be used to protect organizations against account takeovers. Covered topics:
    • Introduction. Many well-known attacks started using credential stuffing and account takeovers. Think about for example TicketMaster and Uber. But what exactly happened? What motivated hackers? What went wrong at the victims? What’s the scale of the problem?
    • Password blacklisting, email breach notification, password breach notification, what are the differences? Explanation of techniques that power well-known services like HaveIBeenPwnd and products from the tech giants. They might look similar, but they are not.
    • Why do most well-known defenses do not protect against account takeover attacks? Techniques like rate limiting and anomaly detection are typically not effective. More complex password policies can even work contra-productive.
    • How to get raw data? For free? Without TOR? Getting raw data is easy. The amount of (semi-)publicly available data is overwhelming. Processing the data is more challenging. 
    • Passwords: how did it all start? History of password storage and password cracking. Lessons (not) learned over the decades.
    • What’s the right tools for the job? Different password hashing algorithms have different characteristics. Some algorithms were not designed for storing passwords at all. Some other algorithms were specifically designed to not work well on generic cost effective hardware, making cracking extremely slow. How to overcome this? We have built FPGA-based crackers based on ex-Bitcoin miners, to achieve an orders of magnitude speed advantage over conventional hardware.
    • How to use recovered credentials to protect accounts? So now we’ve got over seven billion email/password pairs. How to use this unique dataset to disrupt cybercrime?
    • Results and conclusion.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/VBC9AB/</url>
            <location>Second track</location>
            
            <attendee>Jeroen van Beek</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>PGAYXE@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-PGAYXE</pentabarf:event-slug>
            <pentabarf:title>Graph API Mastery - Logs to Real World Attacks</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T150000</dtstart>
            <dtend>20240905T152000</dtend>
            <duration>002000</duration>
            <summary>Graph API Mastery - Logs to Real World Attacks</summary>
            <description>Graph API Mastery: From Logs to Real-World Impact

Introduction

Microsoft Graph API provides a unified endpoint to access Microsoft 365 services, enabling developers to build powerful applications that integrate deeply with the Microsoft ecosystem. This presentation will explore how to leverage Graph API LOGS for enhanced operational security.

Obtaining the Logs
We will discuss methods to access and retrieve logs from Graph API, focusing on setting up appropriate permissions and using relevant endpoints to gather valuable data.

Correlatable Fields &amp; Useful Functions
Learn about fields that can be correlated across different logs and systems to create a comprehensive view of user and application activities. We will also cover useful KQL functions for data analysis.

Delegated vs Application Permissions
Understand the differences between delegated and application permissions, their use cases, and best practices for managing permissions to ensure security and compliance.
Attack Patterns and Hunting/Detection Opportunities
Explore common attack patterns targeting Microsoft Graph API and discover strategies for threat hunting and detection. We will highlight specific indicators of compromise and techniques to identify malicious activities.

From the Frontlines – Real World Stories
Real-world examples and case studies illustrating attacks observed on the frontlines, highlighting how organizations could have used Graph API logs to prevent/monitor security incidents.
Highlighting other researchers and their work:
Highlight contributions from other researchers and authors who have done great work on Microsoft Graph API research. This will include a snippet of who to follow and what they’ve done.

Conclusion
A summary of key takeaways and best practices for leveraging Microsoft Graph API in your organization. Emphasis on the importance of continuous monitoring and the potential for future enhancements. This session aims to equip security professionals with the knowledge to effectively use Microsoft Graph API logs.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/orangecon-2024/talk/PGAYXE/</url>
            <location>Second track</location>
            
            <attendee>Shiva P</attendee>
            
            <attendee>Parthiban R</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FKFSX9@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FKFSX9</pentabarf:event-slug>
            <pentabarf:title>Detect and Reverse engineer - Quick wins for defenders</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T110000</dtstart>
            <dtend>20240905T120000</dtend>
            <duration>010000</duration>
            <summary>Detect and Reverse engineer - Quick wins for defenders</summary>
            <description>If you are interested in Reverse Engineering and Detection engineering, and you want to have a workshop where we learn from eachother in making valuable detection on public samples, than you should look no further! In this workshop we will use Ghidra and some famous public samples to identify quick detection engineering wins.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://pretalx.com/orangecon-2024/talk/FKFSX9/</url>
            <location>Workshop track 1</location>
            
            <attendee>Yassir Laaouissi</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>7YRCCN@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-7YRCCN</pentabarf:event-slug>
            <pentabarf:title>Getting familiar with DESFire</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T133000</dtstart>
            <dtend>20240905T153000</dtend>
            <duration>020000</duration>
            <summary>Getting familiar with DESFire</summary>
            <description>This workshop dives into the basics of the MIFARE DESFire smartcard - a popular smartcard for high-security access control and ticketing systems. The workshop will start with a short lecture covering important concepts of the DESFire standard:

- What standards DESFire is built on top of
- DESFire logical structure
- DESFire authentication &amp; cryptography
- Analyzing DESFire with Proxmark3
- Possible pitfalls.

Afterwards, the hands-on portion of the workshop starts. A set of traces of communication between a DESFire card and a card reader with implementation defects will form the basis of the challenges. Each participant will get access to a Proxmark3 and a blank DESFire card during the workshop, with the goal of &quot;cloning&quot; the card used in the trace and trick the card reader to let you through.

**IMPORTANT**: This workshop requires you to bring your own laptop with Proxmark3 (Iceman fork) v4.18589 client software installed (https://github.com/RfidResearchGroup/proxmark3/releases/tag/v4.18589). Instructions on how to prepare the environment can be found under the &quot;PROXMARK3 INSTALLATION AND OVERVIEW&quot; section of the README. A working Proxmark3 and DESFire card will be provided for use during the workshop. This can be done on a VM with a USB3 controller configured, but expect occasional communication timeouts if you choose to do so.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://pretalx.com/orangecon-2024/talk/7YRCCN/</url>
            <location>Workshop track 1</location>
            
            <attendee>Sebastiaan Groot</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>TTMYBL@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-TTMYBL</pentabarf:event-slug>
            <pentabarf:title>HackTheBox &amp; CTF Methodology - Hands-on workshop</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T110000</dtstart>
            <dtend>20240905T120000</dtend>
            <duration>010000</duration>
            <summary>HackTheBox &amp; CTF Methodology - Hands-on workshop</summary>
            <description>Join Remco van der Meer and Jorian Woltjer, for a unique and hands-on workshop where we&#x27;ll explore the following points:
- Introduction to HackTheBox &amp; Capture The Flag (CTF)
- Link to real penetration tests
- Live Walkthrough of an easy HackTheBox challenge</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://pretalx.com/orangecon-2024/talk/TTMYBL/</url>
            <location>Workshop track 2</location>
            
            <attendee>Remco van der Meer</attendee>
            
            <attendee>Jorian Woltjer</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>3HFRVB@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-3HFRVB</pentabarf:event-slug>
            <pentabarf:title>Be lazy like a cat, making pentesting  fun again</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T133000</dtstart>
            <dtend>20240905T143000</dtend>
            <duration>010000</duration>
            <summary>Be lazy like a cat, making pentesting  fun again</summary>
            <description>Join us for an engaging workshop designed for security enthusiasts eager to improve their vulnerability assessment and reporting skills. 

In this session, you&#x27;ll learn how to accurately describe vulnerabilities, detail reproduction steps, assess impact, and provide effective remediation advice. We&#x27;ll introduce an advanced methodology that significantly reduces the time required for these tasks.

Participants will gain access to specialized templates that streamline the vulnerability reporting process, making it more efficient and less time-consuming. After a brief explanation of the methodology, you will have the opportunity to apply the templates in practical exercises, gaining firsthand experience and enhancing your cybersecurity skills.

This workshop is perfect for anyone passionate about security, looking to enhance their technical skills, and seeking efficient methods for vulnerability assessment and reporting.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://pretalx.com/orangecon-2024/talk/3HFRVB/</url>
            <location>Workshop track 2</location>
            
            <attendee>Brenno de Winter</attendee>
            
            <attendee>Mischa van Geelen</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>F7Q7ZG@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-F7Q7ZG</pentabarf:event-slug>
            <pentabarf:title>Finding vulnerabilities with CodeQL</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20240905T143000</dtstart>
            <dtend>20240905T153000</dtend>
            <duration>010000</duration>
            <summary>Finding vulnerabilities with CodeQL</summary>
            <description>This session will introduce fundamentals of security research when looking for vulnerabilities in software via source code review. We will use an example of a simple vulnerability, walk through how CodeQL could detect it, and provide examples on how the audience could use CodeQL to find vulnerabilities themselves. We will also introduce how we could scale our security research to thousands of projects at once using multi-repository variant analysis.

If you can, please set up the workshop codespace before the workshop by following the instructions in the workshop repository: http://gh.io/orangecon-2024-ws
The codespace is basically a virtual machine from GitHub, which you can use for free for up to 120 hours, and this one will automatically set up everything you need for running CodeQL. After you are done remember to go to https://github.com/codespaces, select the three dots next to the codespace and choose “Stop codespace” so you don’t use up your hours.
We are also going to set it up together during the workshop, so feel free to wait until the workshop day with setup.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://pretalx.com/orangecon-2024/talk/F7Q7ZG/</url>
            <location>Workshop track 2</location>
            
            <attendee>Sylwia Budzynska</attendee>
            
        </vevent>
        
    </vcalendar>
</iCalendar>
